Smart Card Evaluation and Certification in France

Documents pareils
Editing and managing Systems engineering processes at Snecma

Certification Schemes

PACKZ System Requirements. Version: Version: Copyright 2015, PACKZ Software GmbH. 1

Les marchés Security La méthode The markets The approach

Rapport de certification 2002/08

Le Cloud Computing est-il l ennemi de la Sécurité?

Tier 1 / Tier 2 relations: Are the roles changing?

Sécurité des systèmes d'informations et communicants dans le médical

Rapport de certification ANSSI-CC-2013/64

Forthcoming Database

L industrie pharmaceutique et la grippe aviaire

POSITION DESCRIPTION DESCRIPTION DE TRAVAIL

Rapport de certification ANSSI-CC-2014/26. SOMA801STM - application EAC, version 1.0

Synergies entre Artisan Studio et outils PLM

Spécial Catégorie 6 Patch Cords

0,3YDQGLWVVHFXULW\ FKDOOHQJHV 0$,1²0RELOLW\IRU$OO,31HWZRUNV²0RELOH,3 (XUHVFRP:RUNVKRS %HUOLQ$SULO

English Q&A #1 Braille Services Requirement PPTC Q1. Would you like our proposal to be shipped or do you prefer an electronic submission?

Évaluation et Certification Carlos MARTIN Responsable du Centre de Certification de la Sécurité des Technologies de l Information

en SCÈNE RATIONAL Rational Démonstration SDP : automatisation de la chaîne de développement Samira BATAOUCHE sbataouche@fr.ibm.com

Visualisation et Analyse de Risque Dynamique pour la Cyber-Défense

INSTITUT MARITIME DE PREVENTION. For improvement in health and security at work. Created in 1992 Under the aegis of State and the ENIM

Plateforme Technologique Innovante. Innovation Center for equipment& materials

Application Form/ Formulaire de demande

INSTRUMENTS DE MESURE SOFTWARE. Management software for remote and/or local monitoring networks

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

PLM 2.0 : Mise à niveau et introduction à l'offre version 6 de Dassault systèmes

Quatre axes au service de la performance et des mutations Four lines serve the performance and changes

Rapport de certification 2007/05

Tom Pertsekos. Sécurité applicative Web : gare aux fraudes et aux pirates!

Informatique / Computer Science

Once the installation is complete, you can delete the temporary Zip files..

Guide d'installation rapide TFM-560X YO.13

La diffusion du Registre du Commerce et des Sociétés en France

NOM ENTREPRISE. Document : Plan Qualité Spécifique du Projet / Project Specific Quality Plan

The impacts of m-payment on financial services Novembre 2011

Conférence Bales II - Mauritanie. Patrick Le Nôtre. Directeur de la Stratégie - Secteur Finance Solutions risques et Réglementations

Formation. Mastère Spécialisé en Sécurité des Systèmes Intégrés & Applications. Post-master s degree in Security of Integrated Systems & Applications

Instructions Mozilla Thunderbird Page 1

Contents Windows

SERVEUR DÉDIÉ DOCUMENTATION

Name of document. Audit Report on the CORTE Quality System: confirmation of the certification (October 2011) Prepared by.

Cedric Dumoulin (C) The Java EE 7 Tutorial

AUDIT COMMITTEE: TERMS OF REFERENCE

Stratégie DataCenters Société Générale Enjeux, objectifs et rôle d un partenaire comme Data4

Mon Service Public - Case study and Mapping to SAML/Liberty specifications. Gaël Gourmelen - France Telecom 23/04/2007

ADHEFILM : tronçonnage. ADHEFILM : cutting off. ADHECAL : fabrication. ADHECAL : manufacturing.

Interministerial crisis management and operational centre - COGIC

Sécurité des systèmes d exploitation

How to Login to Career Page

Un nouveau modèle d'identité NFC compatible avec l'écosystème mobile, et cas d'usage

I. COORDONNÉES PERSONNELLES / PERSONAL DATA

Archived Content. Contenu archivé

Ingénierie et gestion des connaissances

26th of March 2014, Paris

NIMBUS TRAINING. Administration de Citrix NetScaler 10. Déscription : Objectifs. Publics. Durée. Pré-requis. Programme de cette formation

COPYRIGHT Danish Standards. NOT FOR COMMERCIAL USE OR REPRODUCTION. DS/EN 61303:1997

THÈSE. présentée à TÉLÉCOM PARISTECH. pour obtenir le grade de. DOCTEUR de TÉLÉCOM PARISTECH. Mention Informatique et Réseaux. par.

Software and Hardware Datasheet / Fiche technique du logiciel et du matériel

Rapport de certification PP/0308. Profil de protection «Cryptographic Module for CSP Signing Operations with Backup» Version 0.28

Sagemcom EDI with Suppliers

Embases pour raccordement G1/8 - G1/4

Loi sur l aide financière à la Banque Commerciale du Canada. Canadian Commercial Bank Financial Assistance Act CODIFICATION CONSOLIDATION

INTRODUCTION A LA CERTIFICATION DE LA SÉCURITÉ DES TECHNOLOGIES DE L INFORMATION. Natalya Robert 23 janvier UPMC

Cours de didactique du français langue étrangère (*) French as a foreign language (*)

Développement logiciel pour le Cloud (TLC)

SMALL CITY COMMERCE (EL PEQUEÑO COMERCIO DE LAS PEQUEÑAS CIUDADES)

Rapport de certification ANSSI-CC-2012/47. EJBCA, version 5.0.4

BASE DE DONNÉES DES ASPECTS SOCIOÉCONOMIQUES EN MÉDITERRANÉE OCCIDENTALE

PANDORA database: a compilation of indoor air pollutant emissions

Programming Server-Side Web Applications with Object-Oriented PHP NC Group Syllabus. Duration: 75 hours 1-2-2

La gestion des vulnérabilités par des simulations d'attaques

Mise en place d un système de cabotage maritime au sud ouest de l Ocean Indien. 10 Septembre 2012

ERA-Net Call Smart Cities. CREM, Martigny, 4 décembre 2014 Andreas Eckmanns, Responsable de la recherche, Office Fédéral de l énergie OFEN

Paxton. ins Net2 desktop reader USB

Génie logiciel. Systèmes et sous-systèmes. Modèliser des grands systèmes. Problématique. SS S-Syst1 SS S-Syst2 SS S-Syst3. Système.

Rapport de certification PP/0101

Utiliser une WebCam. Micro-ordinateurs, informations, idées, trucs et astuces

The UNITECH Advantage. Copyright UNITECH International Society All rights reserved. Page 1

Conditions de l'examen

NORME INTERNATIONALE INTERNATIONAL STANDARD. Dispositifs à semiconducteurs Dispositifs discrets. Semiconductor devices Discrete devices

ISO/IEC Comparatif entre la version 2013 et la version 2005

For the attention of all Delegations/ A l attention de toutes les Délégations

GIGABIT PCI DESKTOP ADAPTER DGE-530T. Quick Installation Guide+ Guide d installation+

iqtool - Outil e-learning innovateur pour enseigner la Gestion de Qualité au niveau BAC+2

BILL 13 PROJET DE LOI 13. certains droits relatifs à l approvisionnement en bois et à l aménagement forestier

Face Recognition Performance: Man vs. Machine

Cité du design - Concours d entrée Sadrine Binoux

POLICY: FREE MILK PROGRAM CODE: CS-4

Valorisez vos actifs logiciels avec Rational Asset Manager. Jean-Michel Athané, Certified IT Specialist IBM Rational Software

Projet de réorganisation des activités de T-Systems France

RAPID Prenez le contrôle sur vos données

Qualité et ERP CLOUD & SECURITY (HACKING) Alireza MOKHTARI. 9/12/2014 Cloud & Security

REMOTE DATA ACQUISITION OF EMBEDDED SYSTEMS USING INTERNET TECHNOLOGIES: A ROLE-BASED GENERIC SYSTEM SPECIFICATION

INDUSTRY CANADA / INDUSTRIE CANADA RFP #IC401468/ DDP #IC Retirement Planning Training / Cours de planification de la retraite

Architecture client riche Evolution ou révolution? Thomas Coustenoble IBM Lotus Market Manager

VERS L EXCELLENCE DANS LA FORMATION PROGRAMME D APPUI A LA QUALITE AMELIORATION SUPERIEUR DE LA QUALITE DE L ENSEIGNEMENT TITRE DU PROJET

eprocurement Bernard Longhi SC PDA eproc Domain Coordinator CEN/eBES Chair CLEEP French National Forum Chair Geneva, 21 April 2015

Comment la ville de Westmount a automatisé la préparation de ses réunions du conseil :

Lean approach on production lines Oct 9, 2014

Le jeu d'apprentissage

Transcription:

Direction Centrale de la Sécurité des Systèmes d Information Smart Card Evaluation and Certification in France Thomas Bousson DCSSI

Summary Smart Card History Evaluation of Smart Card Smart Card Acquisition

The beginning of smart cards The inventions of the 70 s The applications in the 80 s

1973 Intel invents EPROM

1974 Mr. Moreno (Inovatron) invents and patents the first Memory Card

1978-1979 1979 In 1978 Mr. Ugon (Bull) invents and patents a the SPOM (Self Programmable One Chip Micro- Computer) The first Smart Card is issued in 1979 by Bull with a Motorola microchip

1980-1985 1985 In 1980, an organisation of French banks is created to use the smart cards as debit/credit cards and in 1985 the first Smart Card for Banking is issued.

1984 French Telecom organisation issues smart card for public phones 2 000 000 cards sold in 1986 6 000 000 cards sold in 1991

Smart Card and Security Smart cards are security oriented In 1986 what was the need of security? Smart card is a computing device that is a security key in a system 1993: First complete (hardware and software) smart card evaluation in France

Smart Card evaluation Smart Card Architecture and Life cycle Hardware evaluation Software evaluation Smart Card evaluation

Physical Architecture Micro-module Plastic Card with user s information

Physical Architecture Micro-module Micro-Contacts Micro-Chip

Physical Architecture Micro-module Micro-Contacts Micro-Chip Micro-Chip CPU EEPROM ROM RAM Microprossessor Memories

Logical organisation Micro-prossessor Memories CPU BUS EEPROM Data ROM Static Data Applications RAM Optional Code /Patches Operating System BUS

Logical view Optional Code /Patches Applications Operating System Data Static Data Software Micro-chip Hardware

Smart Card life cycle Software development Micro-chip design Static Data Database construction Photomask fabrication Patches Manufacturing Data Packaging Finishing process Personalisation End-usage

Smart Card security Requirements for the smart card Protect Data Protect program execution To be fulfilled by the combination of hardware and software

Smart Card evaluation Evaluate the whole at once Check the fulfilment of the requirements by the whole product Difficulties Different kind of developments to take in account 1 chip can be use for different Smart Cards application

Modular evaluation Principle: Evaluate Hardware Evaluate each Software with the hardware Benefits 1 evaluation per developer Reusability of Hardware evaluations for many software applications

Hardware evaluation Optional Code /Patches Data Applications Operating System Static Data Software CPU EEPROM ROM RAM Hardware

Hardware evaluation Software development Micro-chip design Static Data Patches Database construction Photomask fabrication Manufacturing Development Data Packaging Finishing process Usage Personalisation End-usage

Hardware evaluation Need of 1 hardware for different smart card products Software AB C Hardware A

Software evaluation Optional Code /Patches Data Applications Operating System Static Data Software CPU EEPROM ROM RAM Hardware

Software evaluation Software development Micro-chip design Database construction Static Data Photomask fabrication Development Patches Manufacturing Data Packaging Finishing process Usage Personalisation End-usage

Composition evaluation Give a global security assesment on Hardware & Software Evaluate the Hardware independently of the Software Evaluate the Software according to the Hardware evaluation results

Composition evaluation Software Evaluated? Hardware Evaluated

Composition evaluation Some pending questions: Does the Security Target of the Software takes in account the security of the Hardware? Are the security features of the Hardware part correctly used by the Software? Is the right Hardware used with the Software? Does the Software induces new vulnerabilities linked to the Hardware?

Composition activities in hardware PREMIER MINISTRE Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d Information evaluation Hardware Evaluated ST -Lite Security Guidances Config. List ETR-Lite

Composition activities in hardware PREMIER MINISTRE Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d Information evaluation Need of documentation to reuse evaluation results from the hardware: ST-lite States the limits of the hardware evaluation Gives the requirements fulfilled by the Hardware Security Guidance Gives the implementation recommendation to use the security features of the Hardware Configuration List Gives the traceability information for delivery of the correct Hardware ETR-lite for composition Gives the security characteristics of the Hardware in term of potential vulnerabilities or stress

Composite evaluation Software Evaluated Hardware Evaluated Evaluated ST -Lite Security Guidances Config. List ETR-Lite

Composite evaluation Evaluate that the Software takes correctly in account the Hardware characteristics Composite ST covers ST-lite Implementation (ADV_IMP) takes into account Hardware Security Guidance Composite product is build on correct configuration of the Hardware Vulnerabilities take in account both Hardware and Software

Comparing approaches Evaluation of 3 products based on same hardware Software A Software B Software C Hardware A Hardware A Hardware A

Complete products evaluations Smart Card A Smart Card B Smart Card C Software A Software B Software C Hardware A Hardware A Hardware A Evaluate Smart Card A Evaluate Smart Card A Evaluate Smart Card A Time/Costs

Composite products evaluations Smart Card A Smart Card B Smart Card C Software A Software B Software C Hardware A Hardware A Hardware A Evaluate Hardware A Evaluate Software A A Evaluate Software B B Evaluate Software C C Time/Costs

Comparing approaches Evaluate Smart Card A Evaluate Smart Card A Evaluate Smart Card A Evaluate Hardware A Evaluate Software A A Time/Costs Evaluate Software B B Evaluate Software C C

The JIL documentations Joint Interpretation Library Created to give interpretations on ITSEC (european criteria) Giving interpretation for European certification needs Documentation on smart card evaluation done in conjunction with Europe TB3 and ISCI (International Smartcard Certification Initiative) Proposed as CC-Supporting documents To be mandatory used in smart card evaluations

Smart Card evaluation guidance Audience: Evaluation sponsors Developers of smartcard products Content: Smart card terminology Roles in smart card evaluation Advice to prepare evaluation Evaluation work plan v1.2 February 2004

Requirement to perform PREMIER MINISTRE Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d Information Integrated Circuits evaluations Audience: ITSEFs CBs for ITSEF licensing Content: Knowledge and skill required for IC evaluation Specific smart card attacks Necessary tools and equipment for ITSEFs Annex A: Examples for Smartcard Specific Attacks (v1.1 July 2003) v1.1 July 2003

Application of CC PREMIER MINISTRE Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d Information to Integrated Circuits Audience: Manufacturers ITSEFs CBs Content: TOE scope for smartcard Threat model for smartcards Smartcard security objectives Vulnerability and test model v1.3 April 2000

Integrated Circuits Hardware PREMIER MINISTRE Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d Information Evaluation Methodology Audience: Manufacturers ITSEFs CBs Content: Description of all components to EAL5 with a hardware specific understanding Calculating attack potential (chap 7) replaced by: Application of Attack Potential to Smartcards (v1.0 March 2002) v1.0 January 2000

ST-lite Audience: ST writers Content: Minimum requirements for public ST in the scope of CCRA v1.1 July 2002

ETR-lite for composition Audience: Product developers ITSEF Content: Rules for information sharing for re-use of IC evaluation results in smart card evaluation Annex A Composite Smartcard evaluation (v1.2 March 2002) v1.0 March 2002

Risk management Needs Smart Card is mostly a critical element of a system The Risk managers need: High confidence in smart card security Confidence through time Certificate is not for Marketing but to assess the security level

Risk management Offers The French Scheme offers High evaluation levels by specialised laboratories performing State-of-the-art attacks High requirements on licensing (hardware tools ) Harmonisation between laboratories Surveillance process to give periodical assessment on vulnerabilities To maintain the trust on the certificate level

Certified Smart Card in France Evaluation Levels Integrated Circuits Smart Card Products Smart Card Developers

Evaluation Levels EAL 4+ high resistance (AVA_VLA.4) Banking Health Cards EAL 1+ basic resistance (AVA_VLA.2) Small scaled limited trials

Certified SmartCard PREMIER MINISTRE Secrétariat Général de la Défense Nationale Direction Centrale de la Sécurité des Systèmes d Information Integrated Circuits STMicroelectronics 35 certificates on ST16, ST19 & ST22 Atmel 17 certificates on AT05SC & AT90SC Samsung 4 certificates on S3CC9 NEC 1 certificate on V-WAY 64 Infineon 2 certificates on SLE66CX

Certified SmartCard Products Credit Cards Electronic Purse Health Cards Telephone Cards Pay-TV Transportation Cards Tachygraph card Multiservice Cards 29 certificates 15 certificates 7 certificates 6 certificates 4 certificates 4 certificates 1 certificate 15 certificates

SmartCard Developers ASK Axalto CP8 Gemplus IBM Keycorp Mondex NTTData OberthurCS Sagem Schlumberger

Contact certification.dcssi@sgdn.pm.gouv.fr Certification Body SGDN/DCSSI 51, boulevard de la Tour-Maubourg 75700 Paris 07 SP France Tel: +33 1 71 75 82 65 Fax:+33 1 71 75 82 60 www.ssi.gouv.fr